
"The most severe of the resolved issues is CVE-2026-42945 (CVSS v4.0 score of 9.2), a denial-of-service (DoS) condition in NGINX's ngx_http_rewrite_module module. The bug allows an unauthenticated attacker to send crafted HTTP requests that, combined with certain conditions beyond the attacker's control, could trigger a heap buffer overflow and a restart. If Address Space Layout Randomization (ASLR) is disabled, the flaw can be exploited for code execution."
"Next in line is CVE-2026-41225 (CVSS v4.0 score of 8.6), a weakness in iControl REST that could allow an authenticated attacker who has at least Manager permissions to create configuration objects, leading to command execution. "This vulnerability may allow a highly privileged attacker with network access to the affected iControl REST endpoint through the BIG-IP management port or self IP addresses to escalate their privileges or bypass Appliance mode restrictions. In appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. There is no data plane exposure; this is a control plane issue only," F5 explains."
"On Wednesday, the company also announced fixes for high-severity remote code execution (RCE) and remote command injection vulnerabilities (CVE-2026-41957, CVE-2026-34176, CVE-2026-39459) in BIG-IP that require authentication. Of the remaining high-severity flaws, one can lead to restriction bypass, another to arbitrary file tampering, and 12 to denial-of-service (DoS) conditions, mainly by causing the Traffic Management Microkernel (TMM) to terminate."
"The medium-severity issues that F5 addressed this week could lead to security protection bypass, privilege escalation, information disclosure, arbitrary system command execution, DoS conditions, code injection, a"
F5 announced fixes for more than 19 high-severity and 32 medium-severity vulnerabilities affecting BIG-IP, BIG-IQ, and NGINX. The most severe resolved issue is CVE-2026-42945, a NGINX ngx_http_rewrite_module denial-of-service flaw that can trigger a heap buffer overflow and restart, and may enable code execution when ASLR is disabled. CVE-2026-41225 is next, involving iControl REST that could allow an authenticated attacker with Manager permissions to create configuration objects and potentially achieve command execution, including privilege escalation or bypass of appliance mode restrictions. Additional BIG-IP issues include authenticated remote code execution and remote command injection vulnerabilities. Remaining high-severity flaws include restriction bypass, arbitrary file tampering, and multiple denial-of-service conditions, while medium-severity issues cover bypasses, escalation, disclosure, command execution, injection, and DoS.
Read at SecurityWeek
Unable to calculate read time
Collection
[
|
...
]